TROYANOSYVIRUS
Back to CVEs

CVE-2020-15397

HIGH
7.8

Description

HylaFAX+ through 7.0.2 and HylaFAX Enterprise have scripts that execute binaries from directories writable by unprivileged users (e.g., locations under /var/spool/hylafax that are writable by the uucp account). This allows these users to execute code in the context of the user calling these binaries (often root).

CVE Details

CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published6/30/2020
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0

Affected Products

hylafax\+_project:hylafax\+ifax:hylafax_enterprise

Weaknesses (CWE)

CWE-732

References

https://bugzilla.suse.com/show_bug.cgi?id=1173519(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202007-06(af854a3a-2127-422b-91ae-364da2661108)
https://sourceforge.net/p/hylafax/HylaFAX+/2534/(af854a3a-2127-422b-91ae-364da2661108)

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.